201805.01
Off
0

How to Survive a Nasty Software Vendor Audit

in News

Kristin Burnham, CIO.com, 04/30/2018 When software vendor auditors push too far, enterprise technology leaders must be prepared to push back. In an extreme case, the food company Mars (best known for Snickers and M&M’s candies) filed a lawsuit petitioning the court to order Oracle’s auditors to back off. Following the initial “license review” order from Oracle in…

201609.09
Off
1

The Importance of Escrow Agreements in Software and Technology License Agreements

in News

Julie Machal-Fulks, Texas Lawyer, June 2016 Some of their most integral software applications businesses use are under another party’s control. When each party is upholding its end of the licensing bargain, these relationships can be long-lasting and useful. But, in some instances, the licensee can no longer access software on which it relies because the…

201605.17
Off
0

Spotlight on ITAM Review Conference 2016 Speakers

in News

The ITAM Review, May 17, 2016 We’re pleased to announce the details of some of our confirmed conference speakers at our upcoming US conference in Florida on 19th & 20th September and UK conference in London on 4th & 5th October. Here we put 3 of our confirmed speakers under the spotlight. More speaker details can be…

201605.11
Off
0

Software piracy claims can ruin your business and reward those responsible

in News

Robert J. Scott, TechCrunch, 5/11/16 There is a highly divisive and costly practice that software companies have inflicted on their customers for nearly a decade. This practice brings with it significant emotional duress, time investment and financial penalties — all of which divert meaningful resources from revenue-driving activities. And to add insult to injury, this…

201604.12
Off
0

Shadow IT: When Employees Become Bounty Hunters

in News

Michael O’Dwyer, ipswitch, 4/11/16 Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT.